Summary

• A vulnerability in libssh could allow an unauthenticated, remote attacker to bypass authentication on a targeted system.

The vulnerability is due to improper authentication operations by the server-side state machine of the affected software. An attacker could exploit this vulnerability by presenting a SSH2_MSG_USERAUTH_SUCCESS message to a targeted system. A successful exploit could allow the attacker to bypass

Affected Products

Affected Products are all versions of WALLIX Bastion

Workarounds

As this impacts only configuration with SSH public key authentication on primary accounts, a workaround is to remove the public keys and use another authentication method (Password, X509, etc…)

Fixed Software

This vulnerability is fixed in the latest supported versions of our software that are available on our download site.

Exploitation and Public Announcements

• WALLIX is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.